![Cisco Catalyst Blade 3032 Software Configuration Manual Download Page 8](http://html.mh-extra.com/html/cisco/catalyst-blade-3032/catalyst-blade-3032_software-configuration-manual_67665008.webp)
Contents
viii
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-13270-06
Authenticating to a Boundary Switch
6-43
Obtaining a TGT from a KDC
6-43
Authenticating to Network Services
6-44
Configuring Kerberos
6-44
Configuring the Switch for Local Authentication and Authorization
6-44
Configuring the Switch for Secure Shell
6-45
Understanding SSH
6-46
SSH Servers, Integrated Clients, and Supported Versions
6-46
Limitations
6-47
Configuring SSH
6-47
Configuration Guidelines
6-47
Setting Up the Switch to Run SSH
6-47
Configuring the SSH Server
6-48
Displaying the SSH Configuration and Status
6-49
Configuring the Switch for Secure Socket Layer HTTP
6-50
Understanding Secure HTTP Servers and Clients
6-50
Certificate Authority Trustpoints
6-50
CipherSuites
6-51
Configuring Secure HTTP Servers and Clients
6-52
Default SSL Configuration
6-52
SSL Configuration Guidelines
6-52
Configuring a CA Trustpoint
6-53
Configuring the Secure HTTP Server
6-54
Configuring the Secure HTTP Client
6-55
Displaying Secure HTTP Server and Client Status
6-56
Configuring the Switch for Secure Copy Protocol
6-57
Information About Secure Copy
6-57
C H A P T E R
7
Managing Switch Stacks
7-1
Understanding Switch Stacks
7-1
Switch Stack Membership
7-3
Stack Master Election and Re-Election
7-6
Switch Stack Bridge ID and Router MAC Address
7-8
Stack Member Numbers
7-8
Stack Member Priority Values
7-9
Switch Stack Offline Configuration
7-9
Effects of Adding a Provisioned Switch to a Switch Stack
7-10
Effects of Replacing a Provisioned Switch in a Switch Stack
7-11
Effects of Removing a Provisioned Switch from a Switch Stack
7-11